-
9.1 Evading impossibility
-
9.2 The noisy storage model
-
9.3 A simple protocol for 1-2 oblivious transfer in the noisy-storage model
-
9.4 Security from quantum uncertainty
-
9.5 A universal primitive: weak string erasure
Help us improve the OCW website of TU Delft by answering a few short questions.
Filling out this survey will take approximately 5 minutes.